rasta-mouse / OffensiveCSharpLinks
Collection of Offensive C# Tooling
☆12Updated 3 years ago
Alternatives and similar repositories for OffensiveCSharp
Users that are interested in OffensiveCSharp are comparing it to the libraries listed below
Sorting:
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆102Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆39Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Updated 3 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆87Updated 3 years ago
- C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll,kernel32.dll,user32.dll,and kernelbase.dll)☆24Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- The Hunt for Malicious Strings☆13Updated 5 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- cobalt strike tools☆31Updated 3 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- ☆13Updated last year
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆35Updated 3 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆37Updated 4 years ago
- A Control Panel Applet dropper project. It has a high success rate on engagements since nobody cares about .CPL files and you can just do…☆53Updated 7 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆39Updated 4 years ago
- ☆27Updated 4 years ago
- (kinda) Malicious Outlook Reader☆19Updated 4 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 3 years ago
- RDLL for Cobalt Strike beacon to silence sysmon process☆90Updated 3 years ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Updated 2 years ago
- ☆26Updated 4 years ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆87Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 6 months ago
- C2 redirector as a web API☆10Updated 4 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Updated 4 years ago